Author of the publication

Crosstalk-Aware Multiple Error Detection Scheme Based on Two-Dimensional Parities for Energy Efficient Network on Chip.

, , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 61-I (7): 2034-2047 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital image watermarking based on angle quantization in discrete contourlet transform., , , , and . J. King Saud Univ. Comput. Inf. Sci., 29 (3): 288-294 (2017)Optimal Relay Selection Scheme with Multiantenna Power Beacon for Wireless-Powered Cooperation Communication Networks., , , , , , and . Sensors, 21 (1): 147 (2021)Efficient Matrix-Based Channel Hopping Schemes for Blind Rendezvous in Distributed Cognitive Radio Networks., , , , and . Sensors, 18 (12): 4360 (2018)Modelling of light photons detection in scintillation camera., , , , , and . ICSIPA, page 15-19. IEEE, (2013)Effect of impedance variation around the fundamentals on PA distortions characteristics under wideband multi-tone stimulus., , , and . APCCAS, page 1115-1118. IEEE, (2010)LoRa and Rotating Polarization Wave: Physical Layer Principles and Performance Evaluation., , , , , and . IEEE Access, (2023)Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks., , , , and . EURASIP J. Wirel. Commun. Netw., 2020 (1): 105 (2020)A low complexity peak-to-average power ratio reduction scheme based on selected mapping and radix-II IFFT in OFDM systems., , , , and . Telecommun. Syst., 67 (1): 21-30 (2018)Malware analysis performance enhancement using cloud computing., , , , , , and . J. Comput. Virol. Hacking Tech., 10 (1): 1-10 (2014)Low power GPS baseband receiver design., , , and . ICEAC, page 65-68. IEEE, (2013)